The most common form of childhood cancer is leukemia, Calculation for more than one third of all childhood cancers among those ages 1 day – 14 years. The diseases of leukemia are worldwide, it occurred in both genders from male and females and in all age. A total of 80 different samples of patient children were collected from the central teaching hospital of pediatric in Baghdad. Obtained during the period from 1st Sept. 2019 till the 31 th of Aug. 2020. Each isolates identification by using Vitek 2. Isolated organism in leukemic children show 18 (22.5 %) gram positive and 62 (77.5 %) gram negative from the total sample 80 (100.0 %). The percent of male is 45 more than female which represents 35 in most age groups between age (1 d
... Show MoreObjective: Per-implantitis is one of the implant treatment complications. Dentists have failed to restore damaged periodontium by using conventional therapies. Tissue engineering (stem cells, scaffold and growth factors) aims to reconstruct natural tissues. The paper aimed to isolate both periodontal ligament stem cells (PDLSCs) and bone marrow mesenchymal stem cells (BMMSCs) and use them in a co-culture method to create three-layered cell sheets for reconstructing natural periodontal ligament (PDL) tissue. Materials and methods: BMMSCs were isolated from rabbit tibia and femur, and PDLSC culture was established from the lower right incisor. The cells were co-cultured to induce BMMSC differentiation into PDL cells. Cell morphology, stem cel
... Show MoreThe aquatic crude extract of Silybum marianum dry grains prepared by melting them in distil water by the method of soak and shake. The effect of Silybum marianum crude extract studied in vitro on three tumor cell line the Hep-2, AMN-3 and RD for 24, 48 and 72 hours of exposure, and one cell line of normal cells REF for 72 hr exposure. The results showed that the prescence of toxic effect of the aquatic crude extract on the cell lines of Hep-2, AMN-3 and RD at 10 and 100 µg/ ml upto the higher concentrations when they exposed to the extract for 48 hr. as compared with the control treatment, and when the exposure period increased to 72 hr. the toxic effect started at low concentrations (5 and 10 µg/ ml) as compared with the control g
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.